


default search action
16th SoMeT 2017: Kitakyushu City, Japan
- Hamido Fujita, Ali Selamat, Sigeru Omatu:
New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 16th International Conference, SoMeT_17, Kitakyushu City, Japan, September 26-28, 2017. Frontiers in Artificial Intelligence and Applications 297, IOS Press 2017, ISBN 978-1-61499-799-3 - Volker Gruhn, Stefan Gries, Marc Hesenius
, Julius Ollesch, Shafiq-Ur Rehman, Nils Schwenzfeier, Christian Wahl, Florian Wessling:
Engineering Cyber-Physical Systems. 3-18
Chapter 1. Intelligent Software Systems Design, and Software Evolution Techniques
- Hien D. Nguyen
, Nhon V. Do:
Intelligent Problem Solver in Education for Discrete Mathematics. 21-34 - Nhon V. Do, Thanh T. Mai:
Perfect COKB Model and Reasoning Methods for the Design of Intelligent Problem Solvers. 35-50 - Bao Ngoc Trinh, Huynh Quyet Thang
, Thuy-Linh Nguyen:
Research on Genetic Algorithm and Nash Equilibrium in Multi-Round Procurement. 51-64 - Masaru Teranishi, Shinpei Matsumoto, Hidetoshi Takeno:
Flat Finishing Skill Training Software System Based on Personal Peculiarity Classification. 65-72 - Rebwar M. Nabi
, Rania Azad
, Rebaz M. Nabi, Sardasht M.-Raouf Mahmood:
Online Handwritten Signatures Verificaton Using Dynamic Threshold Combined with Local and Global Features. 73-87 - Zalán Bodó
, Bipin Indurkhya
:
Software Categorization Using Low-Level Distributional Features. 88-98 - Juan Bernabé-Moreno, Álvaro Tejeda-Lorente
, Carlos Porcel, Enrique Herrera-Viedma:
A Holistic Domain Knowledge Discovery and Recommendation System for Collaborative Wikis. 99-114
Chapter 2. Artificial Intelligence Techniques on Software Engineering, and Requirement Engineering
- Muhammad Arif Mohamad
, Habibollah Haron, Haswadi Hassan:
Flower Pollination Freeman Chain Code (FP-FCC) Extraction Algorithm for Handwritten Character Recognition. 117-123 - Hidekazu Yanagimoto
:
Support Vector Machines with Neural Network. 124-138 - Aniello Minutolo, Massimo Esposito
, Giuseppe De Pietro:
A Conversational Chatbot Based on Kowledge-Graphs for Factoid Medical Questions. 139-152 - Shafiq-Ur Rehman, Volker Gruhn:
Security Requirements Engineering (SRE) Framework for Cyber-Physical Systems (CPS): SRE for CPS. 153-163 - Sa'adah Hassan, Azrina Kamaruddin
, Novia Admodisastro
, Marzanah A. Jabar:
Towards Developing an Approach to Confluence Innovative in Requirements Engineering. 164-175 - Raquel Ureña
, Francisco Chiclana
, Hamido Fujita
, Enrique Herrera-Viedma:
Confidence Based Consensus in Environments with High Uncertainty and Incomplete Information. 176-189 - Anna Maria Di Sciullo:
Asymmetry Based Parsing and Semantic Compositionality. 190-203 - Daniel Cortés, Mariko Nakano, Hisashi Koga, Héctor Pérez:
Evaluation of Image Descriptors for Urban-Rural Classification of Aerial Images. 204-213
Chapter 3. Medical Informatics and Bioinformatics, Software Methods and Application for Biomedicine and Bioinformatics
- Lukas Peter, Martina Ladrova
, Iveta Bryjova, Martin Cerný
:
Analysis of Heart Rate Variability from Multichannel Photoplethysmography. 217-225 - Eisaku Ohta, Mikito Ogino, Yasue Mitsukura:
Relation Extraction for Circadian Rhythm Using the EEG. 226-232 - Cin-Han Yang, Tun-Wen Pai, Ron-Shan Chen, Hsin-Yiu Chou:
Data Based Feature Identification of Polymorphic Functional Marker from Transcriptome Comparison. 233-241 - Jan Kubícek, Veronika Vicianova, Marek Penhaker
, Martin Augustynek:
Time Deformable Segmentation Model Based on the Active Contour Driven by Gaussian Energy Distribution: Extraction and Modeling of Early Articular Cartilage Pathological Interuptions. 242-255 - Jan Kubícek, Marek Penhaker
, Tomas Ondraczka, Zdenek Machacek
, Martin Cerný
, Martin Augustynek, Petra Maresová:
Automated Extraction and Modeling of Calcifications and Blood Stream Volumetric Parameters. 256-269 - Jan Kubícek, Jana Kosturikova, Marek Penhaker
, Martin Augustynek, Kamil Kuca:
Segmentation Based on Gabor Transformation with Machine Learning: Modeling of Retinal Blood Vessels System from RetCam Images and Tortuosity Extraction. 270-283 - José Antonio Moral-Muñoz
, Adan Toscano, Manuel J. Cobo
, Ignacio J. Pérez
:
mBalance: An Intelligent Android Application to Assess and Analyze Body Balance. 284-297 - Norhaslinda Kamaruddin
, Dini Handayani, Abdul Wahab:
Computational Visualization of Customer Mood Using Affective Space Model Approach. 298-311 - Peter Piros, Rita Fleiner, Tamas Ferenci, Péter Andréka, Hamido Fujita
, Peter J. Oefner, Levente Kovács, András Jánosi:
An Overview of Myocardial Infarction Registries and Results from the Hungarian Myocardial Infarction Registry. 312-320 - Hamido Fujita
, U. Raghavendra, Anjan Gudigar, Vinoy Vishnu Vadakkepat, U. Rajendra Acharya
:
Automated Characterization of Breast Cancer Using Steerable Filters. 321-327
Chapter 4. Commercial Business Oriented Software Application Models and Emergency Disaster Recovery Software Systems
- Shuang Li, Shizune Takahashi, Keizo Yamada, Masanori Takagi, Jun Sasaki:
A Proposal of the Tourism Course Recommendation System (TCRS) for Foreign Tourists by Using Photo Data in Social Network Service. 331-338 - Shizune Takahashi, Shuang Li, Keizo Yamada, Masanori Takagi, Jun Sasaki:
Case Study of Tourism Course Recommendation System Using Data from Social Network Services. 339-347 - Chi-Yo Huang, Jeng-Chieh Cheng:
A Derivation of Factors Influencing the Concept Development of Virtual Reality Products by Hybrid MADM Methods. 348-361 - Ummu Hani' Hair Zaki
, Roliana Ibrahim, Shahliza Abd Halim, Takeru Yokoi
:
A Review on Service Oriented Architecture Approach in Flood Disaster Management Framework for Sentiment Analysis: Malaysia Context. 362-377 - Kyosuke Takahashi
, Hitoshi Inomo, Wataru Shiraki, Shiho Okamoto:
Behavior Support for Residents During Typhoon Based on Association Rule Mining. 378-384 - Fatai Idowu Sadiq, Ali Selamat, Roliana Ibrahim, Md. Hafiz Selamat, Ondrej Krejcar
:
Stampede Prediction Based on Individual Activity Recognition for Context-Aware Framework Using Sensor-Fusion in a Crowd Scenarios. 385-396
Chapter 5. Software Engineering Models, Methodologies, Tools, Designs and Techniques
- Stefan Gries, Marc Hesenius
, Volker Gruhn:
Tracing Cascading Data Corruption in CPS with the Information Flow Monitor. 399-408 - Fumio Narisawa, Yoshikazu Ueda:
Safety Verification Method for Priority-Based Real-Time Software. 409-424 - Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech, Faouzi Moussa:
Wr2Fdr Tool Maintenance for Models Checking. 425-440 - Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Emil Pricop
, Ouejdene Samoud:
Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models. 441-453 - David Fernández-Amorós
, Ruben Heradio
, Carlos Cerrada, Enrique Herrera-Viedma, Manuel J. Cobo
:
Towards Taming Variability Models in the Wild. 454-465 - Wael Chargui, Taoufik Sakka Rouis, Mourad Kmimech, Mohamed Tahar Bhiri, Layth Sliman
, Badran Raddaoui:
Towards a Formal Verification Approach for Service Component Architecture. 466-479 - Vincent von Hof:
Leveraging Test Case Generation in the Testing Process - An Integration of Human Oracles with Derived Oracles. 480-489 - Amal Ayach, Layth Sliman
, Mourad Kmimech, Mohamed Tahar Bhiri, Badran Raddaoui:
Towards a Formal Verification Approach for Cloud Software Architecture. 490-502 - Mario Sotelo-Garrido, Mariko Nakano-Miyatake, Gabriel Sanchez-Perez
, Manuel Cedillo-Hernandez, Héctor Pérez-Meana:
Software Protection Against Illegal Copy Using Software Watermarking. 503-511 - Lifang Dai, Jian Wu
, Francisco Chiclana
, Hamido Fujita
, Enrique Herrera-Viedma:
An Interaction Consensus in Group Decision Making Under Distributed Linguistic Trust Information. 512-524 - Andres Hernandez-Matamoros
, Takayuki Nagai, Muhammad Attamimi
, Mariko Nakano, Héctor Pérez-Meana:
Facial Expression Recogntion in Unconstrained Environment. 525-538 - Sigeru Omatu:
Estimation of Rice Area from Satellite Data Using Neural Networks. 539-549 - Mostafa Ahmed Alksher, Azreen Azman, Razali Yaakob, Rabiah Abdul Kadir
, Abdulmajid Mohamed, Eissa Alshari
:
A Framework for Idea Mining Evaluation. 550-559
Chapter 6. Trends and Practices in Software Engineering Disciplines
- Absalom Shu, Konstantin Markov, Alexander Vazhenin, Ruth Cortez, Subhash Bhalla
, Shashank Shrestha
:
Unified User-Interface and Protocol for Managing Heterogeneous Deep Learning Services. 563-575 - Alexander Vazhenin, Anna Mikheeva
, Petr Dyadkov, Andrey Marchuk:
The Software Using Digital Databases and GIS Interface for Detecting Geodynamic Structures. 576-592 - Anusuyah Subbarao
, Mohd Naz'ri Mahrin:
Formulating Evaluation Model to Assess the Effectiveness of Coordination Processes in Global Software Development Projects. 593-603 - Marco Pota, Massimo Esposito
, Giuseppe De Pietro:
Convolutional Neural Networks for Question Classification in Italian Language. 604-615 - Roberto Chiarvetto, Guido Guizzi, Enrique Kremers, Elpidio Romano
, Lorenzo Damiani, Roberto Revetria, Pietro Giribone:
An Innovative Approach for Rolling Mill and Forge Scheduling Based on Modified COTS Algorithms. 616-627 - Chi-Yo Huang, Hsueh-Hsin Lu, Wen-Hsin Tseng, Meng-Ru Li, Wan-Jung Chang, Yun-Hsuan Yang, Yi-Chia Wu, Ming-Jen Yang, Ming-Jenn Wu:
The Changeable Space Theories Based Capacity Configuration for TFT-LCD Fabs. 628-640 - Nurulhuda Zainuddin, Ali Selamat, Roliana Ibrahim:
Twitter Hate Aspect Extraction Using Association Analysis and Dictionary-Based Approach. 641-651 - Masafumi Nakano, Akihiko Takahashi, Soichiro Takahashi:
Robust Technical Trading with Fuzzy Knowledge-Based Systems. 652-667 - Guido Guizzi, Elpidio Romano
, Lorenzo Damiani, Pietro Giribone, Roberto Revetria, Matteo Toma:
An Ontology Based Model for the Optimization of the Shutters Cutting Stock for Compressor Valves. 668-677 - László Horváth, Imre J. Rudas:
Driving Engineering Model Generation on Functional and Logical Levels. 678-690 - Masurah Mohamad, Ali Selamat:
A New Soft Rough Set Parameter Reduction Method for an Effective Decision-Making. 691-704 - Faizura Haneem, Nazri Kama, Rosmah Ali, Ali Selamat:
Applying Data Analytics Approach in Systematic Literature Review: Master Data Management Case Study. 705-718 - Shashank Shrestha
, Wanming Chu, Yilang Wu, Ruth Cortez, Alexander Vazhenin, Absalom Shu, Subhash Bhalla
:
Workflow Based Query Management System for Astronomical Data Repository. 719-730 - Lim Kok Cheng
, Ali Selamat, Mohd Hazli Mohamed Zabil, Md. Hafiz Selamat, Rose Alinda Alias, Fatimah Puteh, Farhan Mohamed, Ondrej Krejcar
:
Usability Prioritization Using Performance Metrics and Hierarchical Agglomerative Clustering in MAR-Learning Application. 731-744
Chapter 7. Modelling, Analysis and Applications of Intelligent Systems
- Bo Huang, Zhijun Fang, Guoqing Wu, Xiankun Sun, Yongbin Gao:
A New Code Generation Method for Software Engineering: From Requirements Model to Source Code. 747-765 - Yinglin Wang, Jianzhang Zhang:
An Aspect-Based Unsupervised Approach for Classifying Non-Functional Requirements on Software Reviews. 766-778 - Construction of Intelligent Tutoring System Based on Semantic Web. 779-793
- Juan Pu, Xing Wu, Yike Guo, Shaorong Xie, Huayan Pu, Yan Peng:
The Combat of Unmanned Surface Vehicles Based on Wolves Attack. 794-805 - Yuan Liu, Xing Wu, Yike Guo, Shaorong Xie, Huayan Pu, Yan Peng:
The Cooperative Defense Strategy by Multi-USVs. 806-814 - Xing Wu, Yuan Liu, Yike Guo, Shaorong Xie, Huayan Pu, Yan Peng:
The Cooperative Defense System by Team of USVs in Complicated Sea Environment. 815-823 - Gajo Petrovic, Hamido Fujita:
Deep Correct: Deep Learning Color Correction for Color Blindness. 824-834

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.